Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Platform independent distributed system and method that constructs a security management infrastructure

a distributed system and security management technology, applied in the field of security management systems, can solve the problems of security information overload, negative impact on business operations, and high cost of protecting vital business data, and achieve the effects of reducing costs, reducing downtime, and increasing productivity and regulatory complian

Inactive Publication Date: 2007-11-08
ACCOUNTING RISK CONTROL SYST
View PDF19 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0020] The custom report generation tool may include a report generator, a report generation interface and a report viewer interface simple enough for any user to run and view his / her reports, while maintaining the power and versatility to get the reports he / she needs.
[0026] An advantage of the present system is that the system provides a comprehensive security management solution. The system delivers multiple benefits, including reduced costs, less downtime, increased productivity and regulatory compliance. It enables you to make the right decisions at the right time. Furthermore, security management enhances overall security posture and increases your efficiency and effectiveness. In a dynamic computing environment where system reconfiguration and deployment are ongoing events, the system herein disclosed ensures: protection of critical business assets from intruders; proactive risk mitigation by reducing vulnerabilities; enforcement of security policies; automated provisioning and maintenance of digital identities; convenient, secure access to critical business assets by all users; integrated solutions, with centralized control of the extended security infrastructure.

Problems solved by technology

Organization's face significant security challenges in today's world, where protecting vital business data can be an expensive and difficult.
This incessant flood of data literally, millions of messages daily from incompatible security technologies overwhelm the security infrastructure, resulting in security information overload and creating a negative impact on business operations.
With no way to manage and integrate information, this fragmented approach often leads to duplication of effort, high overhead, weak security models and failed audits.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Platform independent distributed system and method that constructs a security management infrastructure
  • Platform independent distributed system and method that constructs a security management infrastructure
  • Platform independent distributed system and method that constructs a security management infrastructure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention provides a security management system (SMS) for regulating access control, tracking the people / assets / events, facilitating reporting and event notification services for users. With reference to FIG. 1, the system's security management region in accordance with the embodiment of the invention is shown. In the most preferred embodiment, the system includes a .NET Framework based enterprise computer system capable of reliably (and asynchronously) communicating with any number of associated partners regardless of their respective protocols, document schemas, etc.

[0037] In the described embodiment, the SMS is coupled to an e-user which can, and usually does, have its own standards and practices for conducting a security management policy. It should be noted that the tracking systems can be in any technology other than .NET. In the most preferred embodiment, the system 2 is implemented using the “C#” (C-Sharp) programming language which provides a managed and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Platform independent distributed software that constructs a security management infrastructure for different locations is described. The software includes a control manager module regulating access to critical business assets. The control manager interfaces with and bridges various type of biometric software and hardware systems. The software further includes a tracking model consisting of a custom report generation tool for monitoring people, business critical assets, and events in any particular location. In addition to tracking and access control, the software provides an event notification service for registering, monitoring, and storing primary / composite events into a modeled event history database. The software is integrated into three components. One component is the company headquarters integrated with platform independent legacy software comprising multi-tiered ERP and business packages for cross domain security management and monitoring. Another component is the managed location where the access control regions are held and the main tracking software is installed. The final component is the client software integrated with the biometric devices, regulating authentication for people, assets, and / or events.

Description

BACKGROUND OF THE INVENTION [0001] This invention relates to a system and method for security management. More specifically, but without limitation, this invention relates to a platform independent distributed system that constructs a security management infrastructure for different locations. [0002] Organization's face significant security challenges in today's world, where protecting vital business data can be an expensive and difficult. For example, a business must proactively address security concerns that impact the applications, databases and other business assets essential to daily operations. A business must convert raw security data into actionable business intelligence. A business must comply with regulations, such as those dictated by the government. Most importantly, a business must ensure continuous business operations by mitigating risk at virtually every level of your organization all while maintaining budgets and achieving operational efficiencies. [0003] Meeting the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00
CPCG06F21/32G06F2221/2101G06F21/6218
Inventor GREESON, ROBERT L.HEBERT, RONALD C.PALOMBO, RICKY J.RUSSO, JOEY D.VELAZQUEZ, ANTONIO J.
Owner ACCOUNTING RISK CONTROL SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products